Characteristicsofpublickeycryptography:
Asymmetric algorithms rely on one key for encryption and a different but related key for
decryption.Thesealgorithmshavethefollowingimportantcharacteristic:
Itiscomputationallyinfeasibletodeterminethedecryptionkeygiv